Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Some of the relevant forensic artifacts from a Linux system include Apache log files, the history file, and the secure or auth.log file, which includes valuable information such as SSH connections or...

1 answer below »


Using the materials in GitLab, Firebase and the
vulnerability report. Please add security features where necessary and write in
a report of what changes were made.



Please use my login for writing the report (It is the same
as the Firebase login).



For the report add to the following link:



https://docs.google.com/document/d/1D2hGLLK2yR6DlvUSJ6OqeEUdG3hU7FOdb6ySKIcGWQc/edit?pli=1&tab=t.0#heading=h.8h0npxsghoww





To connect to the Firebase and GitLab you will need to
connect to the VPN first. Please be very thorough, it needs like I need to have
worked on this for weeks.





Use the following link to access Gitlab. You will have to
first be connected to the VPN



https://gitlab.cs.wwu.edu/users/sign_in



GitLab Login (Alumni Money)



XXXXXXXXXX



&pHjT&D8T*VdBi





Use the following link to connect to the firebase



https://accounts.google.com/InteractiveLogin/signinchooser?continue=https%3A%2F%2Ffirebase.google.com%2F_d%2Freturn%3Fcontinue%3Dhttps%253A%252F%252Ffirebase.google.com%252F&ifkv=AaSxoQyKgRPXvyvulAjae94-DKUd9-NjI8SYYLjXbQdU8rI4JnzumFHTlORJlT9htpNicpny__hE7w&ddm=0&flowName=GlifWebSignIn&flowEntry=ServiceLogin



Firebase Login



XXXXXXXXXX



C!nn@m0n!1998





Use the following link to download the vpn client



https://support.cs.wwu.edu/home/access/csci_vpn/index.html



OpenVPN Connect Login



XXXXXXXXXX



&pHjT&D8T*VdBi

Answered Same Day Nov 19, 2024

Solution

Shubham answered on Nov 19 2024
3 Votes
Forensic artifacts in Linux systems provide important information about the user activities, system operations and potential security
eaches. The key artifacts include Apache log files, history file and secure and auth.log file. Apache logs records details that are related to web server activities like IP addresses, timestamps and accessed URLs. This can help in tracing unauthorized access and web-based attacks. The history file will capture command-line inputs that will reveal executed commands that may indicate malicious behaviour and system changes (Sharma, Grover & Sharan, 2021). The secure and auth.log file documents authentication events like SSH connections,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Looking For Homework Help? Get Help From Best Experts!

Copy and Paste Your Assignment Here